A Comparative study of Open Source IDSs according to their Ability to Detect Attacks.
Ossama BouzianiHafssa BenaboudAchraf Samir ChamkarSaiida LazaarPublished in: NISS (2019)
Keyphrases
- open source
- intrusion detection system
- network attacks
- intrusion detection
- misuse detection
- normal behavior
- detection method
- network intrusion detection
- anomaly detection
- automatic detection
- countermeasures
- denial of service attacks
- key features
- open source software
- comparative study
- network security
- case study
- image watermarking
- detecting malicious
- data mining
- dos attacks
- computer security
- changing environment
- source code
- database systems
- website